Skip to content

Commit 4520a1f

Browse files
committed
Add release notes for 1.78
Signed-off-by: Alexander Scheel <alexander.scheel@keyfactor.com>
1 parent 81da673 commit 4520a1f

1 file changed

Lines changed: 11 additions & 0 deletions

File tree

docs/releasenotes.html

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,18 +24,29 @@ <h2>2.0 Release History</h2>
2424
<h3>2.1.2 Defects Fixed</h3>
2525
<ul>
2626
<li>Issues with a dangling weak reference causing intermittent NullPointerExceptions in the OcspCache have been fixed.</li>
27+
<li>Issues with non-constant time RSA operations in TLS handshakes have been fixed.</li>
28+
<li>Issue with Ed25519, Ed448 signature verification causing intermittent infinite loop have been fixed.</li>
29+
<li>Issues with non-constant time ML-KEM implementation ("Kyber Slash") have been fixed.</li>
30+
<li>Align ML-KEM input validation with FIPS 203 IPD requirements.</li>
31+
<li>Make PEM parsing more forgiving of whitespace to align with RFC 7468 - Textual Encodings of PKIX, PKCS, and CMS Structures.</li>
2732
</ul>
2833
<h3>2.1.3 Additional Features and Functionality</h3>
2934
<ul>
3035
<li>An implementation of MLS (RFC 9420 - The Messaging Layer Security Protocol) has been added as a new module.</li>
3136
<li>NTRU now supports NTRU-HPS4096-1229 and NTRU-HRSS-1373.</li>
37+
<li>Improvements to PGP support, including Curve25519, Curve448 key types.</li>
38+
<li>Add initial support for ML-KEM in TLS.</li>
39+
<li>Add XWing hybrid KEM construction (X25519 + ML-KEM-768).</li>
40+
<li>Introduce initial KEMSpi support (NTRU, SNTRU Prime) for JDK 21+.</li>
41+
<li>Introduce initial composite signature support for X509 Certificates.</li>
3242
</ul>
3343
<h3>2.1.4 Notes.</h3>
3444
<ul>
3545
<li>Both versions of NTRUPrime have been updated to produce 256 bit secrets in line with Kyber. This should also bring them into line with other implementations such as those used in OpenSSH now.</li>
3646
<li>BCJSSE: The boolean system property 'org.bouncycastle.jsse.fips.allowRSAKeyExchange" now defaults to false. All RSA
3747
key exchange cipher suites will therefore be disabled when the BCJSSE provider is used in FIPS mode, unless this system
3848
property is explicitly set to true.</li>
49+
<li>Improve OSGi compatibility.</li>
3950
</ul>
4051

4152
<a id="r1rv77"><h3>2.2.1 Version</h3></a>

0 commit comments

Comments
 (0)